CFP last date
20 June 2024
Reseach Article

Privacy Concerns Impact in Cloud Computing Environment

by Rupal Yadav, Kaptan Singh, Amit Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 37
Year of Publication: 2020
Authors: Rupal Yadav, Kaptan Singh, Amit Saxena

Rupal Yadav, Kaptan Singh, Amit Saxena . Privacy Concerns Impact in Cloud Computing Environment. International Journal of Computer Applications. 176, 37 ( Jul 2020), 11-15. DOI=10.5120/ijca2020920456

@article{ 10.5120/ijca2020920456,
author = { Rupal Yadav, Kaptan Singh, Amit Saxena },
title = { Privacy Concerns Impact in Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2020 },
volume = { 176 },
number = { 37 },
month = { Jul },
year = { 2020 },
issn = { 0975-8887 },
pages = { 11-15 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2020920456 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T00:44:26.077336+05:30
%A Rupal Yadav
%A Kaptan Singh
%A Amit Saxena
%T Privacy Concerns Impact in Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 37
%P 11-15
%D 2020
%I Foundation of Computer Science (FCS), NY, USA

'Cloud' is a generic term for a large variety of innovations and opportunities. This isn't development, but rather a "practical breakthrough," incorporating a variety of previous innovations into anything unique and informative. Cloud storage applies to the delivery of on-demand computing resources via a cloud network, such as software, repositories, file services, emails, etc. Both information and apps are completely contained on the user's device in the conventional computing system. In cloud services, the customer's machine may contain almost no technology or information (maybe just a simple operating system and a web browser), serving as nothing more than a display interface for operations that take place far away on a communications network. Cloud computing is a paradigm that provides fast, on-demand access to a separate fund of customizable computer resources (e.g. routers, databases, memory, software, and facilities) that can be quickly distributed and distributed with minimal effort to manage or interact with service providers. Cloud computing offers computing, technology, access to data, and space resources which do not involvemiddle-user understanding of the physical location and configuration of the computers delivering the services. Parallels to this conceptcan be taken from the power grid, where middle-users burn fuel without understanding the components or resources required to deliver the service. For project work, a safety system with authentication will be put in place. The proposed solution will bring the RC6 & AES Cryptography Authentication Function. Subsequently, an authentication table may also be set up towards the end of the application server to ensure that the user can access what they want.

  1. Jin-Mook Kim and Jeong-KyungMoon,”Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments” published in International Journal od Distributed Sensor Networks by Hindwai Publication Corporation. Volume-1, 2014.
  2. Anurag Jain, Dr. Rajneesh Kumar “Confidentiality Enhanced Security Model for Cloud Environment” ICTCS '16, March 04-05, 2016, Udaipur, India
  3. NasrinKhanezaei, ZurinaMohdHanapi “A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services” IEEE Conference on Systems, Process and Control (ICSPC 2014), 12 - 14 December 2014, Kuala Lumpur, Malaysia
  4. Deyan Chen and Hong Zhao “Data Security and Privacy Protection Issues in Cloud Computing” 2012 IEEE International Conference on Computer Science and Electronics Engineering.
  5. BokefodeJayant D, UbaleSwapnaja A, PingaleSubhash V, KarandeKailash J., ApateSulabha S., “Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model” International Journal of Computer Applications (0975 – 8887) Volume 118– No.12, May 2015
  6. Cindhamani.J, NaguboyniaPunya, RashaEalaruvi, L.D. Dhineshbabu “An enhanced data security and trust management enabled framework for cloud computing systems” IEEE 5th International Conference on Computing, Communications and Networking Technologies July 11-13, 2014, Hefei, China
  7. Shilpi Singh, Vinod Kumar “Secured User’s Authentication and Private Data Storage- Access Scheme in Cloud Computing Using Elliptic Curve Cryptography” 2015 IEEE 2nd International Conference on Computing for Sustainable Global Development.
  8. KawserWazedNafi, TonnyShekhaKar, SayedAnisulHoque, Dr. M. M. A Hashem “A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012
  9. Garrison, G., Kim, S., Wakefield, R.L.: Success Factors for Deploying Cloud Computing. Commun. ACM. 55, 62–68 (2012).
  10. Herhalt, J., Cochrane, K.: Exploring the Cloud: A Global Study of Governments‘ Adoption of Cloud (2012).
  11. Sales force, ―CRM‖,
  12. Venters, W., Whitley, E.A.: A Critical Review of Cloud Computing: Researching Desires and Realities. J. Inf. Technol. 27, 179–197 (2012).
  13. Yang, H., Tate, M.: A Descriptive Literature Review and Classification of Cloud Computing Research. Commun. Assoc. Inf. Syst. 31 (2012).
  14. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing — The Business Perspective. Decis. Support Syst. 51, 176–189 (2011).
Index Terms

Computer Science
Information Sciences


Cloud Cloud Computing Computer Network authentication RC6 AES algorithm.